Not a rootkit. Not ransomware. Something weirder.
She opened a hex editor and scanned the referenced driver binary— echolink.sys , which the INF would copy to System32\drivers . The SYS file was tiny. Too tiny. It contained only a single export: EchoCallbackRoutine . The rest was encrypted data masquerading as padding.
The PayloadAddress pointed to a region of memory that, on a real system, would be dynamically allocated by the driver. But the encrypted data inside echolink.sys wasn’t x86 code—it was a tiny binary blob that, when executed, would reach out to a specific USB controller port and listen . Not for keystrokes. For voltage fluctuations.
Thousands of .inf files. Any one of them could be a door.
She closed the VM, encrypted the file, and wrote a new entry in her case notes:
It rewrote a portion of the Windows kernel’s interrupt dispatch table.